تعداد نشریات | 161 |
تعداد شمارهها | 6,532 |
تعداد مقالات | 70,501 |
تعداد مشاهده مقاله | 124,097,821 |
تعداد دریافت فایل اصل مقاله | 97,205,457 |
اعمال حقوق بیطرفی در فضای سایبر | ||
فصلنامه مطالعات حقوق عمومی دانشگاه تهران | ||
مقاله 8، دوره 46، شماره 2، تیر 1395، صفحه 337-357 اصل مقاله (311.74 K) | ||
شناسه دیجیتال (DOI): 10.22059/jplsq.2016.58200 | ||
نویسنده | ||
فریده شایگان* | ||
استادیار گروه حقوق پردیس بینالمللی کیش دانشگاه تهران | ||
چکیده | ||
افزایشسریع استفاده از فضای سایبر و ویژگیهای منحصربهفرد آن، از جمله بههمپیوسته بودن زیرساختهای سایبر در سراسر جهان و فاقد مرز بودن شبکۀ جهانی اینترنت، از یک سو؛ و امکان استفاده از این فضا و قابلیتهای آن برای انجام حملات سایبری و عبور دادن سلاح سایبر با استفاده از زیرساختهای سایبری سایر دولتها، از سوی دیگر؛ رعایت بیطرفی در مخاصمات مسلحانۀ بینالمللی را با دشواریهای جدی مواجه میسازد. در این شرایط اصل احترام به تعرضناپذیری سرزمین دولتهای بیطرف بهشدت آسیبپذیر میشود و احتمال درگیر شدن دولت بیطرف در مخاصمه و در نتیجه گسترش آن افزایش مییابد؛ نتیجهای که حقوق بیطرفی در پی اجتناب از آن است. بنابراین مطالعه و بررسی قابلیت اعمال حقوق بیطرفی بر فضای سایبر، بهخصوص تعهدات متخاصمان و دولتهای بیطرف و چگونگی اجرای آنها و آثار حقوقی نقض تعهدات بیطرفی ضروری مینماید. | ||
کلیدواژهها | ||
تعهدات متخاصمان؛ تعهدات دولت بیطرف؛ جلوگیری از نقض بیطرفی خاتمه دادن به نقض بیطرفی؛ حاکمیت بر فضای سایبر؛ حقوق بیطرفی؛ فضای سایبر؛ مخاصمات مسلحانۀ بینالمللی | ||
مراجع | ||
الف) کتابها 1. Henckaerts, Jean-Marie & DOSWALD-BECK, Louise (2005), Customary International Humanitarian Law, Vol. 1, Cambridge/New York: CICR/Cambridge University Press, 628 p.
2. Neff, Stephen C. (2000), The Rights and Duties of Neutrals: A General History, Manchester, Manchester University Press, 246 p.
ب) مقالات 3. Brown, Davis (2006), “A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict”, Harvard International Law Journal, Vol.47, No.1, pp.179-221.
4. Deeks, Ashley (2013), “The Geography of Cyber Conflict: Through a Glass Darkly”, International Law Studies, Vol.89, pp.1-20.
5. Doswald-Beck, Louise (2002), “Some Thoughts on Computer Network Attack and the International Law of Armed Conflict”, International Law Studies, Vol.76, pp.163-185.
6. Droege, Cordula (2012), “Get off my Cloud: Cyberwarfare, International Humanitarian Law, and the Protection of Civilians”, IRRC, Vol. 94, No. 886, pp.533-578.
7. Franzese, Patrick W. (2009),“Sovereignty in Cyberspace: Can It Exist?”,Air Force Law Review, Vol. 64, No. 1, pp. 1-42.
8. Heinegg, Wolff Heintschel von (2012), “Neutrality in Cyberspace”, 4th International Conference on Cyber Conflict, available at: https://ccdcoe.org/ sites/default/files/multimedia/pdf/1_3_von_Heinegg_NeutralityInCyberspace.pdf>. 2014/4/6.
9. Heinegg, Wolff Heintschel von (2013), “Territorial Sovereignty and Neutrality in Cyberspace”, International Law Studies, Vol.89, pp.123-156. 10. Jensen, Eric Talbot (2012), “Sovereignty and Neutrality in Cyber Conflict”, Fordham International Law Journal, Vol.35, No.3, pp.815-841.
10. Kastenberg, Joshua E. (2009), “Non-Intervention and Neutrality in Cyberspace: An Emerging Principle in the National Practice of International Law”, Air Force Law Review, Vol.64, No.1, pp.43-64.
11. Kelsey, Jeffrey T.G. (2008), “Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare”, Michigan Law Review, Vol.106, No.7, pp.1427-1451.
12. Lopez, C. Todd, “Fighting in Cyberspace Means Cyber Domain Dominance”, Air Force Print News, Feb. 28, 2007, available at:http://www.af.mil/News/ ArticleDisplay/ tabid/223/Article/127803/fighting-in-cyberspace-means-cyber-domain-ominance.aspx. 2015/9/17.
13. Schaap, J. (2009), “Cyber Warfare Operations: Development and Use under International Law”, Air Force Law Review, Vol.64, No.1, pp.121-174.
14. Schindler, Dietrich, “Transformations in the Law of Neutrality since 1945”, in: Humanitarian Law of Armed Conflict: Challenges Ahead, Essays in Honour of Frits Kalshoven, Delissen, Astrid J. M. (ed.) (1991), Dordrecht: ,pp. 367-386.
15. Shaygan, Farideh, “International Humanitarian Law and Legitimate targets in Cyber Conflict”, AALCO Journal of International Law, Vol. 3, No. 2, 2014, pp.67-93.
16. Sklerov, Matthew J. (2009), “Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect Their Duty to Prevent”, Military Law Review, Vol.201, Fall 2009, pp.1-85.
17. Tuukkanen, “Sovereignty in the Cyber Domain”, in The Fog of Cyber Defence, edited by Rantapelkonen, Jari and Salminen, Mirva, Helsinky: National Defence University, Publications Series 2, Article Collection n. 0 10, 2013, pp.37-45.
18. Walker, George K. (2000), “Information Warfare and Neutrality”, Vanderbilt Journal of Transnational Law, Vol.33, No.5, 1079-1202.
19. Wingfield, Thomas (2000), “The Law of Information Conflict: National Security Law in Cyberspac”, Falls Church, VA: Aegis Research Corporation, 2000, 497 p.
ج) آرای قضایی و داوری 20. ICJ, Reports 1949, Corfu Channel Case, Judgment of 9 April 1949.
21. ICJ, Reports 1980, Case concerning United States Diplomatic and Consular Staff in Tehran, Judgment of 24 May 1980.
22. sland of Palmas Case, Netherland v. USA, Reports of International Arbitral Awards, Vol. II, 4 April 1928.
د) سایر منابع 23. قانون جرایم رایانهای جمهوری اسلامی ایران، مصوب 11 بهمن 1388. 24.Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare, Program on Humanitarian Policy and Conflict Research at Harvard University, 2010.
25. Cyber Security Strategy for Germany, Federal Ministry of Interior, 2011, available at: <https:// www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_ Repository/Germany_2011_Cyber_Security_Strategy_for_Germany.pdf>. 2015/10/22.
26. HPCR Manual on International Law Applicable to Air and Missile Warfare, Program on Humanitarian Policy and Conflict Research, University of Harvard, Bern, 15 May 2009, available at: <ihlresearch.org/amw/HPCR%20Manual.pdf>. 2014/2/25.
27.Humanitarian Law in Armed Conflicts- Manual, Bonn 1992, The Federal Ministry of Defence of the Federal Republic of Germany.
28. International Law Association (1998), Helsinki Principles on the Law of Maritime Neutrality, Taipei, ILA Report of Sixty-Eight Conference.
29. ILC (2001), Draft Articles on Responsibility of States for Internationally Wrongful Act.
30.Law of Armed Conflict at the Operational and Tactical Levels, National Defence of Canada, August 2001.
31.San Remo Manual on International Law Applicable to Armed Conflicts at Sea, 12 June 1994.
32. Schmitt, Michael (ed.) (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare, Prepared by the International Groupe of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Cambridge/New York, Cambridge University Press: available at: <http://www. ccdcoe.org/249.html>. 2014/02/24.
33.The Joint Service Manual of the Law of Armed Conflict, 2004, UK Ministry of Defence. .
34. The UK Cyber Security Strategy. Protecting and Promoting UK in a Digital World, November 2011, available at: <https://www.gov.uk/government/uploads/system/ uploads/attachment_data/file/60961/uk-cyber-security-strategy-inal.pdf >. 2015/5/15.
35.US Commander’s Handbook on the Law of Naval Operations, Newport 1997.
36. US Department of Defense Office of General Counsel (1999), An Assessment of International Legal Issues In Information Operations, available at: <http://www. maxwell.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf>. 2014/11/6.
37. US Department of Defense (2005), The Strategy for Homeland Defense and Civil Support, Washington D. C., available at: available at http://www. defense.gov/news/ Jun2005/d20050630homeland.pdf>. 2015/5/21.
38. US Department of Defense (2011), Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, available at: <https://fas.org/irp/eprint/dod-cyber.pdf>. 2015/5/11.
39. US Department of Defense (2012), Dictionary of Military and Associated Terms, 2012, available at: <www.dtic.mil/doctrine/dod_dictionary/>. 2015/10/17. | ||
آمار تعداد مشاهده مقاله: 1,622 تعداد دریافت فایل اصل مقاله: 1,236 |